The Breaking of the AR Hash Function

نویسندگان

  • Ivan Damgård
  • Lars R. Knudsen
چکیده

The AR hash function has been proposed by Algorithmic Research Ltd and is currently being used in practice in the German banking world. AR hash is based on DES and a variant of the CBC mode. It produces a 128 bit hash value. In this paper, we present two attacks on AR hash. The rst one constructs in one DES encryption two messages with the same hash value. The second one nds, given an arbitrary message M, an M 0 6 = M with the same hash value as M. The attack is split into two parts, the rst part needs about 2 33 DES encryptions and succeeds with probability 63%, the second part needs at most about 2 66 DES encryptions and succeeds with probability about 99% of the possible choices of keys in AR. Moreover, the 2 33 respectively 2 66 encryptions are necessary only in a one-time preprocessing phase, i.e. having done one of the attacks once with success, a new message can be attacked at the cost of no encryptions at all. Since the hash value is 128 bits long, the times for the attacks should be compared to 2 64 , resp. 2 128 DES encryptions for brute force attacks. For the particular keys chosen in AR hash we implemented the rst part of the second attack. In 2 33 encryptions we found two messages that breaks AR hash. The AR hash function has been proposed by Algorithmic Research Ltd., it has been distributed in the ISO community 1] for informational purposes, but has not been considered a standard. It is currently in use in the German banking world. In the following, DES k (y) will denote the DES-encryption of block y using key k. The basic structure in AR-hash can be described as a variant of DES in CBC-mode, where the last 2 ciphertext blocks are added to the current input, and where the state consists of the last two "ciphertext" blocks computed. To do the entire function, the message is processed with two keys, yielding a result of 2 times 128 bits. This is then further compressed to get a result of 128 bits. To deene AR more precisely, we rst divide the message m to be hashed into 8-byte blocks, denoted by m 1 ; m 2 ; :::; m n (0-padding is used on the last block if it is incomplete).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Hash Function Based on the Tillich-Zémor Hash Function

Using the idea behind the Tillich-Zémor hash function, we propose a new hash function. Our hash function is parallelizable and its collision resistance is implied by a hardness assumption on a mathematical problem. Also, it is secure against the known attacks. It is the most secure variant of the Tillich-Zémor hash function until now.

متن کامل

A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA

In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...

متن کامل

Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respec...

متن کامل

Plagiarism checker for Persian (PCP) texts using hash-based tree representative fingerprinting

With due respect to the authors’ rights, plagiarism detection, is one of the critical problems in the field of text-mining that many researchers are interested in. This issue is considered as a serious one in high academic institutions. There exist language-free tools which do not yield any reliable results since the special features of every language are ignored in them. Considering the paucit...

متن کامل

The cosine method to Gardner equation and (2+1)- dimensional breaking soliton system

In this letter, we established a traveling wave solution by using cosine function algorithm for Gardnerequation and (2+1)-dimensional breaking soliton system. The cosine method is used to obtain theexact solution.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993